The effect of the following program segment can best be described as __________.

```
if (x > y)
z = x;
if (x == y)
z = 0;
if (x < y)
z = y;
```
a. The smaller of x and y is stored in z.
b. The larger of x and y is stored in z.
c. The larger of x and y is stored in z unless x and y are equal, in which case z is assigned zero.
d. The larger of x and y is stored in z unless x and y are not equal, in which case z is assigned zero.
e. none of the above


c. The larger of x and y is stored in z unless x and y are equal, in which case z is assigned zero.

Computer Science & Information Technology

You might also like to view...

_______________ generally specify related functionality that must be added to the basic control to increase its strength in a given situation.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following statements is true of a priority_queue?

a. It does not allow insertions in sorted order. b. Each of its common operations is implemented as an inline function. c. A bucket sort is usually associated with it. d. It must be implemented as a deque.

Computer Science & Information Technology

XHTML ____________________ was not backward compatible with earlier XMTML versions and was discontinued due to lack of support.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Temporal Key Integrity Protocol (TKIP) has three major components to address vulnerabilities.  List and describe them.

What will be an ideal response?

Computer Science & Information Technology